CSA  >> Vol. 7 No. 10 (October 2017)

    基于像素差和索引函数的信息隐藏算法
    An Information Hiding Algorithm Based on Pixel Di?erence and Index Function

  • 全文下载: PDF(1218KB) HTML   XML   PP.913-926   DOI: 10.12677/CSA.2017.710104  
  • 下载量: 76  浏览量: 108   国家自然科学基金支持

作者:  

申淑媛,余松森:华南师范大学,软件学院,广东 佛山;
黄立宏:长沙理工大学,湖南 长沙

关键词:
像素差索引函数信息隐藏Pixel Value Difference Index Function Information Hiding

摘要:

在2 × 2像素块中,参考像素值由索引函数随机确定,然后计算参考像素与其周围的其它三个像素值的差,根据像素差所处的划分范围决定嵌入像素的秘密信息比特数。利用余函数嵌入秘密信息有效地减少载密图像的失真度,在提取信息的过程中,量化后的像素值能准确的提取秘密信息。改进了Jung和Yoo提出的基于索引函数信息隐藏算法,使算法更具有安全性。

In the 2 × 2 pixel block, reference pixel values was randomly determined by the index function, And we calculated the pixel value difference between reference pixel value and the other three pixel value around it. The number of secret data was embedded according to the range of pixel value difference. Using complementary function embedded secret information to effectively re-duce the load of image distortion degree. In the process of extracting information, the quantitative pixel values can accurately extract the secret information. Our proposed method improves the Jung and Yoo information hiding algorithm based on index function, and the proposed algorithm has more security.

文章引用:
申淑媛, 黄立宏, 余松森. 基于像素差和索引函数的信息隐藏算法[J]. 计算机科学与应用, 2017, 7(10): 913-926. https://doi.org/10.12677/CSA.2017.710104

参考文献

[1] Cox, I.J., Miller, M.L., Bloom, J.A., Fridrich, J. and Kalker, T. (2008) Digital Watermarking and Steganography. 2nd Edition. Morgan Kaufmann, San Francisco.
[2] Hsu, C.S. and Tu, S.F. (2010) Probability-Based Tampering Detection Scheme for Digital Images. Optics Communications, 283, 1737-1743.
https://doi.org/10.1016/j.optcom.2009.12.073
[3] Hong, W., Chen, T.S. and Shiu, C.W. (2009) Reversible Data Hiding for High Quality Images Using Modification of Prediction Errors. Journal of systems and Software, 82, 1833-1842.
https://doi.org/10.1016/j.jss.2009.05.051
[4] Provos, N. and Honyman, P. (2003) Hide and Seek: An Introduction To Steganography. IEEE Security and Privacy Magazine, 1, 32-44.
https://doi.org/10.1109/MSECP.2003.1203220
[5] Xu, H., Wang, J. and Kim, H.J. (2010) Near-Optimal Solution to Pair-Wise LSB Matching via An Immune Programming Strategy. Information Sciences, 180, 1201-1217.
https://doi.org/10.1016/j.ins.2009.12.027
[6] Wu, D.C. and Tsai, W.H. (2003) A Steganographic Method for Images by Pixel-Value Differencing. Pattern Recognition Letters, 24, 1613-1626.
https://doi.org/10.1016/S0167-8655(02)00402-6
[7] Wang, C.M., Wu, N.I., Tsai, C.S. and Hwang, M.S. (2008) A High Quality Steganographic Method with Pixel-Value Differencing and Modulus Function. Journal of Systems and Software, 81, 150-158.
https://doi.org/10.1016/j.jss.2007.01.049
[8] Joo, J.C., Lee, H.Y. and Lee, H.K. (2010) Improved Steganographic Method Preserving Pixel-Value Differencing Histogram With Modulus Function. EURASIP Journal on advances in signal processing, 1, 1-13.
[9] Luo, W., Huang, F. and Huang, J. (2010) Edge Adaptive Image Steganography Based on LSB Matching Revisited. IEEE Transactions on Information Forensics and Security, 5, 201-214.
https://doi.org/10.1109/TIFS.2010.2041812
[10] Yang, C.H., Weng, C.Y., Wang, S.J. and Sun, H.M. (2008) Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems. IEEE Transactions on Information Forensics and Security, 3, 488-497.
https://doi.org/10.1109/TIFS.2008.926097
[11] Luo, D.C., Wu, N.I., Wang, C.M., Lin, Z.H. and Tsai, C.S. (2010) A Novel Adaptive Steganography Based on Local Complexity and Human Vision Sensitivity. Journal of Systems and Software, 83, 1236-1248.
https://doi.org/10.1016/j.jss.2010.01.050
[12] Chang, K.C., Huang, P.S., Tu, T.M. and Chang, C.P. (2007) Adaptive Image Stegannographic Scheme Based on Tri-Way Pixel-Value Differencing. ISIC IEEE Internation Conference, 1165-1170.
[13] Jung, K.H., Ha, K.J. and Yoo, K.Y. (2008) Image Data Hiding Method Based on Multi-Pixel Differencing and LSB Substitution Methods. International Conference on Convergence and Hybrid Information Technoligy, 355-358.
https://doi.org/10.1109/ICHIT.2008.279
[14] Balasubramanian, C., Selvakumar, S. and Geetha, S. (2014) High Payload Image Steganography with Reduced Distortion Using Octonary Pixel Pairing Scheme. Multimedia Tools and Applications, 73, 2223-2245.
https://doi.org/10.1007/s11042-013-1640-4
[15] Jung, K.H. and Yoo, K.Y. (2014) High-Capacity Index Based Data Hiding Method. Multimedia Tools and Applications.
[16] Lee, C.F., Chen, H.L. and Tso, H.K. (2010) Embedding Capacity Raising in Reversible Data Hiding Based on Prediction of Difference Expansion. Journal of Systems and Software, 83, 1864-1872.
https://doi.org/10.1016/j.jss.2010.05.078
[17] Zeng, X.T., Li, Z. and Ping, L.D. (2012) Reversible Data Hiding Scheme Using Reference Pixel and Multilayer Embedding. AEU International Journal of Electronics Communication, 66, 532-539.
https://doi.org/10.1016/j.aeue.2011.11.004
[18] Hong, W. (2013) Adaptive Image Data Hiding in Edges Using Patched Reference Table and Pair-Wise Embedding Technique. Information Sciences, 221, 473-489.
https://doi.org/10.1016/j.ins.2012.09.013
[19] Wang, Z. and Bovik, A.C. (2002) A Universal Image Quality Index. IEEE Signal Processing Letters, 9, 81-84.
https://doi.org/10.1109/97.995823
[20] Fridrich, J., Goljan, M. and Du, R. (2001) Reliable Detection of LSB Steganography in Grayscale and Color Images. Proceedings of ACM Workshop on Multimedia and Security, 27-30.
https://doi.org/10.1145/1232454.1232466
[21] Zhang, X.P. and Wang, S.Z. (2004) Vulnerability of Pixel-Value Differencing Steganography to Histogram Analyais and Modification for Enhanced Security. Pattern Recognition Letters, 331-339.
https://doi.org/10.1016/j.patrec.2003.10.014
[22] Yang, C.H., Wang, C.Y. and Sun, H.M. (2008) Information Hiding Technique Based on Blocked PVD. Journal of Inforamtion Management, 15, 29-48.